Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.
Get unlimited Incident Response with threat suppression guarantee - anytime, anywhere.
Cyber risk and advisory programs that identify security gaps and build security strategies to address them.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Seamless integration and threat investigation across your existing tech stack.
Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Extend your team capabilities and prevent business disruption with expertise from eSentire.
We balance automated blocks with rapid human-led investigations to manage threats.
Guard endpoints by isolating and remediating threats to prevent lateral spread.
Defend brute force attacks, active intrusions and unauthorized scans.
Investigation and threat detection across multi-cloud or hybrid environments.
Remediate misconfigurations, vulnerabilities and policy violations.
Investigate and respond to compromised identities and insider threats.
Stop ransomware before it spreads.
Meet regulatory compliance mandates.
Detect and respond to zero-day exploits.
End misconfigurations and policy violations.
Defend third-party and supply chain risk.
Prevent disruption by outsourcing MDR.
Adopt a risk-based security approach.
Meet insurability requirements with MDR.
Protect your most sensitive data.
Build a proven security program.
Operationalize timely, accurate, and actionable cyber threat intelligence.
THE THREAT eSentire is aware of multiple reports [1] [2] attributing recent Device Code Authentication phishing campaigns to Russian state-sponsored APT groups. Device Code…
Feb 06, 2025THE THREAT Beginning in early January 2025, eSentire Threat Response Unit (TRU) observed an increase in the number of incidents involving the NetSupport Remote Access Trojan…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Three MDR package tiers are available based on per-user pricing and level of risk tolerance.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
eSentire is aware of multiple reports [1] [2] attributing recent Device Code Authentication phishing campaigns to Russian state-sponsored APT groups. Device Code Authentication phishing involves a victim entering a threat-actor generated device code into a legitimate Microsoft Device Code Authentication workflow. Using the threat actor provided code would provide threat actors with a valid access token, allowing them to access connected victim resources including accounts, emails, and cloud storage without requiring a password. Persistent access to victim accounts is established for as long as the compromised token remains valid.
Real-world attacks have resulted in reconnaissance activity, the theft of sensitive information, and the misuse of compromised accounts to conduct additional phishing attacks.
While Device Code Authentication phishing is not novel, its recent use by multiple threat actor groups indicates wider adoption and a potential increase in related attacks. Organizations are strongly encouraged to set conditional access policies on Microsoft 365 tenants to defend against similar activity.
Recently observed campaigns have been attributed to Russian-based threat actors including Storm-2372, CozyLarch, UTA0304, and UTA0307. Threat actors have been observed targeting government and non-governmental organizations within Information Technology (IT), defense, telecommunications, health, education, and energy industries. Organizations have been targeted within Europe, North America, Africa, and the Middle East. The threat actors have been reported to be impersonating individuals from various organizations, including the United States Department of State, Ukrainian Ministry of Defense, European Union Parliament, and research institutions.
The phishing attack consists of users receiving spear-phishing emails, or messages through WhatsApp or Signal. These phishing messages are followed by invitations to join Microsoft Teams chatrooms, Element chatrooms (an encrypted messaging application), or be granted access to the Microsoft 365 tenant of the organization that the threat actor is posing from, as an external user.
Regardless of the lure used, all hyperlinks within the phishing emails either redirect or lead the victim directly to the legitimate Microsoft Device Code OAuth workflow. The threat actor instructs the user to enter a code that they have generated into this workflow. Once the user continues with the authentication process, the threat actor is granted access to the user's Office 365 account. In one instance of the attack, an interstitial page was observed prior to the Microsoft Device Code OAuth workflow which provided the code for the victim to enter, rather than being provided in real-time by the threat actor. As Device Codes are only valid for 15 minutes after being generated, this method removes the expiration time of the phishing attack.
Once access has been gained access to the users account, post-exploitation activity observed includes the threat actor attempting to move laterally by sending out additional phishing messages from the victim’s account to other internal users. Threat actors have also been observed using Microsoft Graph to search through messages containing key words such as 'username', 'password', 'admin', 'teamviewer', 'anydesk', 'credentials', 'secret', 'ministry', and 'gov'. Emails found from the above searches were observed being exfiltrated, along with other documents that may be of interest to the threat actor.
In the latest updates, Microsoft has identified a shift in Storm-2372’s tactics, leveraging a specific client ID for Microsoft Authentication Broker in the device code sign-in flow. This method grants the actor a refresh token, enabling them to register an attacker-controlled device within Entra ID and obtain a Primary Refresh Token (PRT) to access organizational resources. Furthermore, Storm-2372 has been observed leveraging proxies that align with the target's region, likely to evade detection.
References:
[1] https://www.microsoft.com/en-us/security/blog/2025/02/13/storm-2372-conducts-device-code-phishing-campaign/
[2] https://www.volexity.com/blog/2025/02/13/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication/
[3] https://learn.microsoft.com/en-us/entra/identity/conditional-access/policy-block-authentication-flows
[4] https://learn.microsoft.com/en-us/entra/id-protection/howto-identity-protection-configure-risk-policies
[5] https://learn.microsoft.com/en-us/entra/identity/devices/manage-device-identities#configure-device-settings
[6] https://www.esentire.com/what-we-do/security-awareness-training-managed-phishing-training